SRNSEC
  • Home
  • SERVICES
  • Blog

What we do best

application PENETRATION TESTING

​Our methodology has been refined over hundreds of engagements, and is built on a foundation of industry best practices, experience and our own vulnerability research. This is what we love to do. 

Past engagements have included: 
 
​​               o             Web Applications (Java, .Net, PHP, Python, Ruby/Rails)
               o             CMS systems and WordPress
               o             Thick Clients
               o             Mobile (iOS, Android, BlackBerry)  
               o             Binaries (x86, x64 and ARM)
               o             Embedded devices (Internet of Things)
               o             Firmware

That said, there's nothing we like more than a new challenge, Reach out and let's discuss how we can help you. 

network penetration testing

From networks of thousands hosts to special purpose systems, we've assessed all types of infrastructures across a spectrum of technologies, Drawing from our team's private and public sector experience, our methodology involves far more than running "auto-exploit" and calling it a day. Working from misuse cases that we custom build with our clients, we focus on targeted objectives based on the highest risk scenarios to provide the best value on our engagements . 

training

We're happy to provide onsite or virtual training tailored to the requirements of your organization. Some of the areas we've been asked to provide training on include:

​               o             Social Engineering Awareness Training and Readiness Review
               o             Application Assessments
               o             Penetration Testing
               o             Exploit Development 
               o             Secure Coding
​

CONTINUOUS SECURITY ASSESSMENT

A subscription to our application and network penetration testing service, consisting of continuous retesting of your applications and infrastructure, giving a current view of their security posture and helping to highlight any newly introduced vulnerabilities. ​
​

cloud security assessments

Ensuring safe and secure integration is key as more and more applications leverage cloud services for presentation, authentication and data storage, This a targeted assessment of how your application leverages these services,
​

PRIVATE ctFs

​A private capture-the-flag event hosted on-site at your organization or through our cloud infrastructure - ideal for practicing hands-on skills or identifying new talent. The CTF challenges and game type are tailored to your specific requirements 

Home



SERVICES

BLOG

© COPYRIGHT 2020. ALL RIGHTS RESERVED.
  • Home
  • SERVICES
  • Blog